Directories

Access Control List Configuration Downloads

1

WinAgents IOS Config Editor 3.1.2.32 (winagents.com)

It provides easy access control list management, creation of configuration backups and editing running and startup device configuration files.Generally, WinAgents IOS Config Editor is a text editor specially designed to edit configuration files for the ...

Author: WinAgents Software Group | Size: 3276 K | Shareware

Category: Network & Internet - Tools & Utilities

2

WinAgents IOS Config Editor 3.1 (winagents.com)

It provides easy access control list management, creation of configuration backups and editing running and startup device configuration files. Generally, WinAgents IOS Config Editor is a text editor specially designed to edit configuration files for ...

Released: Mar 13, 2012 | Author: Tandem Systems, Ltd. | Size: | Shareware

Category: Network & Internet - Monitoring Tools

3

SecureOff 3.0 (lotus-notes-export.com)

Remove NSF Enforce a consistent Access Control List across all replicas of this database settings SecureOff removes local security from NSF files (Lotus Notes databases). Simple - saves you heaps of time. No more running around trying to find the correct ...

Released: May 13, 2012 | Author: Kim Beros Consulting Pty Ltd | Size: 503 K | Shareware

Category: Security & Privacy - Other

4

BPACLer 1.0.0.4 (bpsoftware.com)

BPACLer is a utility the displays a file or folder s effective access control list (ACL) (user and group permissions) and owner information. BPACLer eliminates the tedious process of selecting a file or folder object and having to browse through each ...

Author: BPSoftware.com | Size: 368 K | Freeware

Category: Security & Privacy - Access Control

5

ACL Report Tool SecReport 1.5.6.9 (smart-x.com)

ACL Report Tool - SecReport Enterprise generates Acl reports for your network's NTFS Files and Folders ...

Author: SmartX | Size: 22661 K | Shareware

Category: System Utilities - Misc. Utilities

6

CD Access Control Professional 1.0.1 (dynamicdesigns.co.uk)

CD Access Control Professional checks all inserted compact disks againts a set of rules. these rules determine whether the disk is allowed to be run or ejected from the system. When a CD is ejected a message is displayed. Schedule when a disk can be ...

Author: Dynamic Designs Software | Size: 1631 K | Shareware

Category: System Utilities - Misc. Utilities

7

Symantec Network Access Control 12.1 (symantec.com)

Symantec Network Access Control is a network security solution that controls access to corporate networks, enforces endpoint security policy and easily integrates with existing network infrastructures. Regardless of how endpoints connect to the network, ...

Released: Mar 9, 2012 | Author: Symantec Corporation | Size: | Commercial

Category: Network & Internet - Monitoring Tools

8

Sophos Network Access Control 3.5 (sophos.com)

Sophos Network Access Control (NAC) Advanced safeguards data. NAC Advanced protects information by permitting access to the users who need it and enables companies to create comprehensive security policies to check that any computer accessing the network ...

Released: Mar 28, 2012 | Author: Sophos | Size: 20316 K | Shareware

Category: Security & Privacy - Access Control

9

Net2 Access Control OEM SDK 4.2 (paxton.co.uk)

The Net2 OEM SDK allows experienced C# developers to create third party applications that integrate with the Net2 access control system. Once installed, samples and documentation can be access from the [Net2 Access Control OEM SDK] program group. The ...

Released: Feb 12, 2012 | Author: Paxton Access Limited | Size: | Shareware

Category: Development - C / C++ / C#

10

Lobby Track - Access Control Software 4.3 (jollytech.com)

Lobby Track Access Control Software is a new secure tracking, access control, and visitor management software system. This innovative new technology allows organizations to track employees and equipment with detailed activity logs by individual or groups, ...

Released: Mar 24, 2013 | Author: Jolly Technologies | Size: 26081 K | Shareware

Category: Security & Privacy - Access Control

11

WinAgents RouterTweak 2.0.1.1603 (winagents.com)

WinAgents RouterTweak is a specialized terminal shell making it easier to control the configuration of routers, switches and firewalls from the Cisco Systems company.Knowing the principles of working with the command line interface of Cisco devices, you ...

Author: WinAgents Software Group | Size: 4608 K | Freeware

Category: Network & Internet - Tools & Utilities

12

Program Sentry 2.1 (LeithauserResearch.com)

Provides access control and usage management. When installed, it allows you to either create a list of blocked programs or a list of allowed programs. In the blocked programs mode, any program on the list is blocked. In the allowed program mode, any program ...

Released: Mar 29, 2012 | Author: Leithauser Research | Size: | Shareware

Category: Security & Privacy - Access Control

13

SafeLogon 2.0 (gemiscorp.com)

SafeLogon is a multi-user and password-based access control utility that enhances and complements the Windows built-in logon and authentication system. In other words, SafeLogon allows you to protect your system at home and office from unauthorized access.

Author: GemiScorp | Size: 2291 K | Shareware

Category: System Utilities - Misc. Utilities

14

Web Padlock 3.2 (LeithauserResearch.com)

a a Web Padlock is a program that provides access control and usage management over your computer's Web browser. This gives you controlaover what Web pages can be viewed on your computer. Once installed, Web Padlock blocks other Web browsers (like Internet ...

Author: Leithauser Research | Size: 847 K | Shareware

Category: Security & Privacy - Access Control

15

Program Selector Pro 98/ME 4.3 (LeithauserResearch.com)

Program Selector Pro 98/ME is a computer security program that provides access control and usage management. When installed, it replaces the standard Windows 95/98/ME user interface (task bar, Start button, and icons) with a convenient user configurable ...

Author: Leithauser Research | Size: 510 K | Shareware

Category: Security & Privacy - Access Control

16

Program Selector Pro 2000/XP 4.3 (LeithauserResearch.com)

Program Selector Pro 2000/XP is a computer security program that provides access control and usage management. When installed, it replaces the standard Windows 2000/XP user interface (task bar, Start button, and icons) with a convenient user configurable ...

Author: Leithauser Research | Size: 516 K | Shareware

Category: Security & Privacy - Access Control

17

PlanetRemote Plus 2.01 (planetdns.net)

PlanetRemote allows you to take control of your computer and access your files remotely as if you were actually sitting right in front of it! You can control your computer using a standard web browser from any computer connected to the Internet or your ...

Author: NewAce Corporation | Size: 10365 K | Shareware

Category: Network & Internet - Remote Computing

18

WebAllow 3.15 (weballow.com)

WebAllow is a parental and access control utility that restricts viewing all but selected websites. If you are concerned that your teenager instead of doing the homework is browsing the Internet this tool is for you. If your 5-7 year old is playing flash ...

Author: WebAllow | Size: | Shareware

Category: Network & Internet - Networking

19

AxiomCoders LANProtector Manager 2.1 (axiomcoders.com)

Network Access Control makes sure that only authorized computers and devices have access to your network. With Silent Network Monitoring you can have a passive overview of who is currently connected to your network without letting anyone know about you ...

Released: Mar 22, 2012 | Author: AxiomCoders | Size: 1966 K | Shareware

Category: Network & Internet - Monitoring Tools

20

CrossTec Remote Control 11.0 (crosstecsoftware.com)

CrossTec Remote Control is designed to provide you with vital tools to help you access, control and support PCs across your operation. CrossTec Remote Control is 64-bit and Windows 7 Compatible.See the remote PC's screen, control its keyboard and ...

Released: Jan 6, 2012 | Author: CrossTec Corp | Size: 7495 K | Shareware

Category: Network & Internet - Remote Computing

21

The Media Access Mailing List (joeclark.org)

Subscription information for list dedicated to closed-captioning, audio description, Web, CD-ROM, multimedia access, and related ...

22

Access Control Technologies Inc. (actinc.theshoppe.com)

Use a one card solution to control access to copiers, faxes, computers and vending machines while allowing users to complete a prepaid cashless ...

23

Stancom Industrial CCTV And Access Control (mindspring.com)

Total industrial security distributor specializing in all types of security systems and ...

24

Access Control UK (accesscontrol-uk.co.uk)

Offers smart card technology solutions for access control.

25

Videx Door Entry and Access Control (videx-security.com)

Designs and manufactures audio and video security entry systems, door entry intercoms and access control ...

26

John Carr Security & Access Control (johncarrsecurity.com)

Provides tailored security solutions for both commercial and domestic premises in the Sussex and Surrey ...

27

Cisco Secure Access Control Server (cisco.com)

Provides centralized control for networks of access systems. Site includes ...

28

Mirage Networks - Network Access Control (miragenetworks.com)

Complete control over the endpoint devices on your network, combining agentless Network Access Control (NAC) with day-zero threat prevention and automated policy ...

29

CVS Access Control List Extension (cvsacl.sourceforge.net)

CVSACL provides advanced ACLs per modules, directories, and files on branch/tag for remote cvs repository connections. Execution of all CVS subcommands can be controlled with eight different permissions.

30

Rule Set Based Access Control (RSBAC) for Linux (rsbac.org)

The standard package includes a range of access control models like MAC, RC, ACL. Additionally, the runtime registration facility (REG) makes it easy to implement your own access control model as a kernel module and get it registered at ...

 

Access Control List Configuration Free Downloads - 2000 Shareware periodically updates software information and pricing of Access Control List Configuration from the publisher, so some information may be slightly out-of-date. You should confirm all information before relying on it. Software piracy is theft, Using Access Control List Configuration crack, password, registration codes, key generators, serial numbers is illegal.